A. Alanezi, Bassem Abd-El-Atty, H. Kolivand, A. A. Abd El-Latif
{"title":"Quantum based encryption approach for secure images","authors":"A. Alanezi, Bassem Abd-El-Atty, H. Kolivand, A. A. Abd El-Latif","doi":"10.1109/CAIDA51941.2021.9425127","DOIUrl":null,"url":null,"abstract":"Data security and privacy act vital tasks in our daily lives. Traditional cryptosystems may be hacked amidst the growth of quantum resources. Consequently, we need new cryptosystems its construction is based on quantum concepts. In this work, we proposed a novel image cryptosystem using quantum walks. We employ a diversity of tools for experimental assessment of the presented cryptosystem including correlation analysis, histogram analysis, Shannon entropy analysis, UACI and NPCR analyses, Key sensitivity analysis, and occlusion analysis. These metrics show the advantages of our cryptosystem over some robust state-of-art cryptosystems.","PeriodicalId":272573,"journal":{"name":"2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIDA51941.2021.9425127","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Data security and privacy act vital tasks in our daily lives. Traditional cryptosystems may be hacked amidst the growth of quantum resources. Consequently, we need new cryptosystems its construction is based on quantum concepts. In this work, we proposed a novel image cryptosystem using quantum walks. We employ a diversity of tools for experimental assessment of the presented cryptosystem including correlation analysis, histogram analysis, Shannon entropy analysis, UACI and NPCR analyses, Key sensitivity analysis, and occlusion analysis. These metrics show the advantages of our cryptosystem over some robust state-of-art cryptosystems.